Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 08:20

General

  • Target

    d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe

  • Size

    365KB

  • MD5

    d5f142b409d4ee2db56859ac3ecdad66

  • SHA1

    3048d6d0fae713f04145e190c2e24047efaaef7e

  • SHA256

    4883acd78928ccbab14d46de6f5be7ed91f0d6be16ad83b5214dfbbb218865bf

  • SHA512

    dac8b3c4a3d19753ef1cff5c17e4c1470897175cac0854c922c406acbb589192ab9614d0e965344789b1644ec62971e0664fc7466926d5788750063f242a4e6b

  • SSDEEP

    6144:Q9x8PY/bqy9n2wRfvtkOthbRiPwEMJ4ynpMiO6h1Kkbb9pIPKaaMqXFU2XihU:Q9x8PuhRFRdDhtuW4ybL1xbRKPtHT

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

l9

Decoy

vegobro.com

smartcoffeetoday.com

30ans2chats.com

montidauniospitali.com

quarterlifestyleblog.com

euronlinesolutions.com

compositedoors2you.com

swiftdws.com

fivestarenergyspecialist.com

wwwyh6622.com

outdoor-grill.site

fireequipmentatlanta.com

8640pe.com

kzwzx.loan

thincore.net

smsdshop.com

qzchangxinsb.com

jswztc.net

qjqlfhu.com

noza-consulting.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d5f142b409d4ee2db56859ac3ecdad66_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1480-0-0x00000000741F1000-0x00000000741F2000-memory.dmp

    Filesize

    4KB

  • memory/1480-1-0x00000000741F0000-0x000000007479B000-memory.dmp

    Filesize

    5.7MB

  • memory/1480-2-0x00000000741F0000-0x000000007479B000-memory.dmp

    Filesize

    5.7MB

  • memory/1480-3-0x00000000741F0000-0x000000007479B000-memory.dmp

    Filesize

    5.7MB

  • memory/1480-4-0x00000000741F0000-0x000000007479B000-memory.dmp

    Filesize

    5.7MB

  • memory/1480-10-0x00000000741F0000-0x000000007479B000-memory.dmp

    Filesize

    5.7MB

  • memory/2872-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2872-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2872-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2872-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2872-11-0x0000000000870000-0x0000000000B73000-memory.dmp

    Filesize

    3.0MB